Sciweavers

405 search results - page 62 / 81
» Avatar-centric Risk Evaluation
Sort
View
ECIS
2003
14 years 11 months ago
The transformation of work in european banks: an analysis of IT skills
Researches that have recently investigated the impact of developments in Information Technologies (IT) on human capital in the banking industry analysed only marginally the evolut...
Paolo Neirotti, Emilio Paolucci
WSCG
2003
148views more  WSCG 2003»
14 years 11 months ago
Generating Nonverbal Indicators of Deception in Virtual Reality Training
Old Dominion University (ODU) has been performing research in the area of training using virtual environments. The research involves both computer controlled agents and human part...
Frederic Rick McKenzie, Mark W. Scerbo, Jean M. Ca...
ANOR
2010
102views more  ANOR 2010»
14 years 9 months ago
Optimal control of dosage decisions in controlled ovarian hyperstimulation
Abstract In the controlled ovary hyperstimulation (COH) cycle of the in vitro fertilization-embryo transfer (IVFET) therapy, the clinicians observe the patients' responses to ...
Miao He, Lei Zhao, Warren B. Powell
ESE
2008
112views Database» more  ESE 2008»
14 years 9 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
77
Voted
CSDA
2006
71views more  CSDA 2006»
14 years 9 months ago
Practical representations of incomplete probabilistic knowledge
This article deals with the compact representation of incomplete probabilistic knowledge which can be encountered in risk evaluation problems, for instance in environmental studie...
Cédric Baudrit, Didier Dubois